Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe 5. June 2018

Size: px
Start display at page:

Download "Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe 5. June 2018"

Transcription

1 Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe martin.grossen@avnet.eu 5. June 2018

2 Prepare for the 2nd wave of Digital Transformation Wave 1: The Microcontroller (MCU) Wave 2: Internet Connectivity 1970 s 1980 s 1990 s 2000 s 2010 s 2020 s 2030 s 03-Jun-18 2

3 Manufacturers have a compelling desire to build connected MCU-based devices How does a consumer know the compressor in their fridge needs to be replaced? Option 1 Melted ice cream and spoiled milk Option 2 Message that a technician with replacement compressor will arrive tonight Connected devices create profoundly better customer experiences

4 October 21, 2016 Botnet Attack Observations Device Security is a socioeconomic concern DAY 1 the attack is Technology headline in NY Times DAY 2 the attack is Politics headline Future attacks could be much larger This attack was small; just 100K devices Imagine a 100M-device attack Future attacks could create huge liability exposure Hackers could brick an entire product line in a day Actuating devices could cause property damage or loss of life The industry response to date is inadequate For example, network vendors offer to turn off network ports The attack exploited well-known weaknesses Weak common passwords, no early detection, no remote update, etc

5 The danger is real, especially for IoT devices The Mirai Botnet (aka Dyn Attack), Oct 2016: Largest IoT DDoS attack. Large portions of the internet going down, including Twitter, the Guardian, Netflix, Reddit and CNN. Affected devices: Webcams and DVR players. The Jeep Hack, July 2015: A team of researchers was able to take total control of a Jeep SUV by exploiting a firmware update vulnerability. The TRENDnet Webcam Hack, Jan Access to camera and microphone over TCP/IP. The Hackable Cardiac Device from St.Jude, Jan. 2017: The vulnerability provided access to drain the battery, change heartbeat pace and to trigger shocks. The Printer Hack to catch fire, Nov. 2011: Made the fuser overheat, causing the paper in the printer to catch fire. 5

6 The internet security battle Microsoft has been fighting it for decades so they have some experience to share. Also on hardware side! Example X-BOX: XBOX: Hacked within weeks -> Standard Intel x86 system XBOX 360:Hacked within 3,5 month -> HW hack to compromise the bus: XBOX One: Not hacked until today -> also thanks to in-chip bus firewalls 6

7 Highly-secured connected devices require 7 properties Hardware Root of Trust Is your device s identity and software integrity secured by hardware? Defense in Depth Does your device remain protected if a security mechanism is defeated? Small Trusted Computing Base Is your device s TCB protected from bugs in other code? Dynamic Compartments Certificate-Based Authentication Failure Reporting Renewable Security Can your device s security protections improve after deployment? Does your device use certificates instead of passwords for authentication? Does your device report back about failures and anomalies? Does your device s software update automatically? = Silicon support required = OS support required = Cloud Service support required

8 Azure Sphere is and end-to-end solution for creating highlysecured, connected MCU devices Secured MCUs A new class of crossover Azure Sphere MCUs, from our silicon partners, with built-in Microsoft security technology provide connectivity, high performance, and a secured hardware root of trust. Secured Operating System The highly-secured Azure Sphere IoT OS combines the best of Microsoft and OSS technologies to create a trustworthy platform for new IoT experiences Secured by our Cloud Service The Azure Sphere Security Service guards every Azure Sphere device; it protects your devices and customers, detects emerging threats, and proactively responds.

9 Azure Sphere: Technology and Solution Overview

10 So what is Azure Sphere exactly? Azure Sphere is not a single chip but a security solution / technology built with a combination of a special mirocontroller, a special operating system and the corresponding cloud services Azure Sphere is a highvalue, cost effective solution, secured by Microsoft. The solution today contains: Azure Sphere Chip MT3620 Azure Sphere Security Services for 10 years Azure Sphere IoT OS with 10 years of on-device updates

11 Today, only Azure Sphere provides all 7 Properties for secured IoT Chip OS& Service Hardware Root of Trust Defense in Depth Small TCB Dynamic Compartments Certificate-based Auth. Failure Reporting Renewable Security MT3620 Azure Sphere Espressif ESP32 RTOS &? Marvell 88MW300/2 RTOS &? Qualcomm QCA4010 RTOS &? Broadcom BCM43907 RTOS &? TI CC3220x RTOS &? = Full, Partial, or No Silicon support = Full, Partial, or No OS support = Full, Partial, or No Cloud Security Service support

12 Azure Sphere History Project started in 2014 in Microsoft Research, now part of AI&R division Started working on prototype chip and OS in 2015 Established seven properties of highly secured devices Ran a security challenge based on prototype chip and OS in 2017 Actively working with partners and customers for production in 2018 Hardware Root of Trust Defense in Depth Small Trusted Computing Base Dynamic Compartments Certificate-Based Authentication Failure Reporting Renewable Security

13 Azure Sphere: The chip MT3620

14 Azure Spheres MCU s - Create a secured foundation for intelligent edge devices Secured With built-in Microsoft security technology i.e. I/O bus firewalls including the Pluton Security Subsystem Microsoft Pluton security subsystem Firewall Firewall FLASH 4MB Firewall Firewall Network Connection WiFi in first chip Firewall Performance With built-in Cortex-A7 processors Delivers significantly greater performance vs. similar traditional MCU ARM ARM Cortex-A Cortex-A optimized optimized for for low power low power Firewall Firewall SRAM 4MB Firewall Multiplexed I/O Firewall ARM Cortex-M(s) for real time processing Firewall Connected With built-in networking GPIO PWM TDM I2S UART I2C SPI ADC

15 MT3620 Block Diagram

16 Device Development using the MT3620

17 Device Development Options Use a module Use the chip directly and solder to PCB

18 Azure Sphere Silicon Partners to implement the Pluton Security Core Microsoft is working with other suppliers to implement the Azure Sphere Pluton Security Core into their HW:

19 Azure Sphere: The Operating System

20 Azure Sphere IoT OS: Unequalled security and agility Azure Sphere OS Architecture OS Layer 4 App Containers for POSIX (on Cortex-A) App Containers for I/O (on Cortex-Ms) Secure Application Containers Compartmentalize code for agility, robustness & security OS Layer 3 OS Layer 2 OS Layer 1 On-chip Cloud Services Secure HLOS Kernel Security Picovisor On-chip Cloud Services Provide update, authentication, and connectivity Secured HLOS Kernel Empowers agile silicon evolution and reuse of code Security Picovisor Guards integrity and access to critical resources Hardware Azure Sphere MCUs

21 I/O App Runtime Peripherals (e.g. UART, GPIO, etc.) OS Services Posix App Runtime Azure Sphere IoT OS: Basic Architecture Developer Experience (on PC) Board / Module Azure Sphere SoC Visual Studio Integration Cortex-A core Customer POSIX App Connectivity Solution Vendor Firmware Azure Sphere SDK Azure Sphere Device Communication Service Runtime for POSIX Apps (e.g. Base C API; Azure IoT; HTTP client; UART, GPIO APIs, etc.) Application Container Pluton Security Subsystem Pluton Security Subsystem Architectural Layers Customer Applications OS Services Custom Linux Kernel Picovisor & Firmware Networking management Application management OTA update client Device AuthN client User Mode Supervisor Mode Custom Linux Kernel Security Picovisor Cortex-M: I/O core(s) Customer I/O App Library for I/O Apps (e.g. inter-core comms, etc.) RTOS / Runtime

22 Azure Sphere: The Cloud Services

23 Azure Sphere Cloud Security Service The Azure Sphere Security Service guards every Azure Sphere device. It renews security, identifies emerging threats, and brokers trust between device, cloud, and other endpoints. Protecting devices with certificate-based authentication Guaranteeing device authenticity and running only your genuine software Getting insight into device and application failure and visibility into emerging threats Deploys app updates to your Azure Sphere powered devices

24 Azure Sphere: The Software Development

25 Azure Sphere and Visual Studio enhance your productivity Simplify Development Focus your device development effort on the value you want to create Accelerate Deployment Bring the power of automation to your development experience Streamline Debugging Experience interactive, context-aware debugging across device and cloud Connect your Developers Apply tool-assisted collaboration across your entire development organization

26 Azure Sphere development tools Device PC App Static Libs Azure Sphere SDK CLIs Compiler, Headers, etc Cloud

27 Azure Sphere: The Development Board

28 MT3620 Development Board MT3620 FT4232HQ Micro USB socket

29 Open Source Reference Design Schematic PCB layout 3D CAD models Currently available in Altium Designer format

30 Azure Sphere: Live Demo

31 Azure Sphere Live Demo Prerequisite You need following prerequisite to run this live demo on the Azure Sphere development board: - Installed Visual Studio 2017 version 15.3 or later - Installed Azure Sphere SDK and Tools version Configured all drivers and network settings per description in SDK/Tool documentation - Updated Azure Sphere development board with firmware Claimed and assigned Azure Sphere development board under your AAD (cutil.exe) - Configured WiFi (dutil.exe) - Connected Azure Sphere development board via USB to Computer - Connected Azure Sphere development via WiFi - Azure Subscription with a running IoT Hub in

32 Azure Sphere Live Demo: Visual Studio 2017 Start Visual Studio 2017, create new project: File -> New -> Project

33 Azure Sphere Live Demo: Visual Studio 2017 Select: Visual C++ -> Cross Platform -> Azure Sphere

34 Azure Sphere Live Demo: Visual Studio 2017 In Solution Explorer, add a new connected service with right mouse click on References

35 Azure Sphere Live Demo: Visual Studio 2017 Under Connected services choose Azure IoT Hub

36 Azure Sphere Live Demo: Visual Studio 2017 Under Connect, select your Azure subscription running the IoT Hub

37 Azure Sphere Live Demo: Visual Studio 2017 Under Connect, select your Azure subscription running the IoT Hub

38 Azure Sphere Live Demo: Visual Studio 2017 Under IoT Hub, select the running IoT Hub you want to use for this demo

39 Azure Sphere Live Demo: Visual Studio 2017 Under Device, select your device

40 Azure Sphere Live Demo: Visual Studio 2017 If the device was never connected, you have to create a new device with a new name

41 Azure Sphere Live Demo: Visual Studio 2017 Under Summary, click Finish

42 Azure Sphere Live Demo: Visual Studio 2017 This has added the azure_iot_hub.h and azure_iot_hub.c into your solution

43 Azure Sphere Live Demo: Visual Studio 2017 In main.c, find the #error tag and delete this comment out of the code (line 60, 61 & 62)

44 Azure Sphere Live Demo: Visual Studio 2017 Under Debug, Start Debugging or press F5. If never built before, you will be asked to build first

45 Azure Sphere Live Demo: Visual Studio 2017 In Device Output Windows, you will see the output from the GPIO-, WiFi- and AzureIoTHub API

46 Azure Sphere Live Demo: Visual Studio 2017 AzureIoTHub API is submitting states every 10 seconds

47 Azure Sphere Live Demo: Visual Studio 2017 Log into the Azure Portal where the IoT Hub is running and click on the IoT Hub resource

48 Azure Sphere Live Demo: Visual Studio 2017 In the IoT Hub, click on IoT devices

49 Azure Sphere Live Demo: Visual Studio 2017 In IoT devices, click on the name of the Azure Sphere development board

50 Azure Sphere Live Demo: Visual Studio 2017 In Device Details, click on Device Twin

51 Azure Sphere Live Demo: Visual Studio 2017 Scroll down in the device twin JSON file and find the reported blink rate and version number

52 Azure Sphere Live Demo: Visual Studio 2017 Press button A on the device and Refresh the Device Twin: Rate and Version has changed

53 Azure Sphere Live Demo: Visual Studio 2017 Back in Device Details, click on Message To Device

54 Azure Sphere Live Demo: Visual Studio 2017 Type in a message to the device in the Message Body and click Send Message

55 Azure Sphere Live Demo: Visual Studio 2017 AzureIoTHub API is prompting message from IoT Hub in the Visual Studio Output Window

56 Azure Sphere: The new security technology

57 Azure Sphere is Open Open Chips MCU manufacturer are free to license (without royalty) the security chip kernel Pluton for use in any chip whether or not it uses our OS or cloud * Open Kernel MCU manufacturers are free to innovate with our GPL d HLOS kernel code base Open Cloud Azure Sphere devices are free to connect to Azure or any other cloud, proprietary or public Open Data Your data belongs to you. Azure Sphere secures your data connections, but we never see your data Open Development Device manufacturers are free to use Visual Studio or any other development tools with Azure Sphere * Azure Sphere branding requires a Azure Sphere chip with an Azure Sphere OS and Azure Sphere Security Services

58 What is the value add from AVNET Silica? AVNET was selected on a worldwide base as the exclusive distributor for the Azure Sphere technology. AVNET Silica is driving Azure Sphere in Europe. What we offer Advisory services Product & solution design Embedded / IoT licensing Technical trainings Integration services Cloud & digital services Supply chain services Logistics Azure Sphere document package: You have to register first to get the document links by

59 What is the Advantage from AVNET Silica on the Azure side? AVNET Silica is a Microsoft CSP (Cloud Solution Provider) for industrial applications No credit card needed: AVNET Silica will standard invoice Azure consumption over SAP every month AVNET Silica will help to set up the Azure subscriptions, set the consumption limit and the access credentials / levels AVNET Silica will provide a detailed monthly Azure consumption report per service and per day AVNET Silica is supporting together with Microsoft Azure architects the projects on industrial OEM level 59

60 AVNET: Contact us! For Azure Sphere topics worldwide: For Microsoft Embedded / IoT topics in Europe: Microsoft@Silica.com 60

61 Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe martin.grossen@avnet.eu 5. June 2018

Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist

Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,

More information

Building secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On

Building secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On Building secure devices on the intelligent edge with Azure Sphere Paul Foster, Microsoft Dr Hassan Harb, E.On Microcontrollers (MCUs) low-cost, single chip computers 9 BILLION new MCU devices built and

More information

Azure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft

Azure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft Azure Sphere: Fitting Linux Security in 4 MiB of RAM Ryan Fairfax Principal Software Engineering Lead Microsoft Agenda o o o o Intro to Azure Sphere Kernel Customizations User mode services / App Model

More information

Building a Better Mousetrap:

Building a Better Mousetrap: Building a Better Mousetrap: Deploying and Managing IoT Solutions for ITPros Anthony Bartolo Sr. Cloud Advocate Microsoft #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Engage customers Optimize operations p Connected

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

BCM4343W IoT Starter Kit Getting Started Guide Version 2.1

BCM4343W IoT Starter Kit Getting Started Guide Version 2.1 BCM4343W IoT Starter Kit Getting Started Guide Version 2.1 Page 1 Copyright 2017 Avnet, Inc. AVNET, Reach Further, and the AV logo are registered trademarks of Avnet, Inc. All other brands are the property

More information

Microsoft's IoT Vision and Roadmap. Sam George Director, Azure IoT

Microsoft's IoT Vision and Roadmap. Sam George Director, Azure IoT Microsoft's IoT Vision and Roadmap Sam George Director, Azure IoT IoT Enables a Digital Feedback Loop IoT Enables a Digital Feedback Loop The benefits are profound IoT enables a digital feedback loop that

More information

Windows IoT Security. Jackie Chang Sr. Program Manager

Windows IoT Security. Jackie Chang Sr. Program Manager Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport

More information

Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop

Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland

More information

New Approaches to Connected Device Security

New Approaches to Connected Device Security New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the

More information

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat

More information

How to protect Automotive systems with ARM Security Architecture

How to protect Automotive systems with ARM Security Architecture How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked

More information

Designing Security & Trust into Connected Devices

Designing Security & Trust into Connected Devices Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations

More information

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)

More information

Designing Security & Trust into Connected Devices

Designing Security & Trust into Connected Devices Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A

More information

Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices

Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Dr. Johann Heyszl, Head of Hardware Security Department Fraunhofer-Institute for Applied and Integrated Security

More information

Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi

Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi 30.7B connected devices by 2020, 75.4B by 2025 Top IoT concerns Security Complex standards

More information

ArduCAM CC3200 UNO board

ArduCAM CC3200 UNO board ArduCAM CC3200 UNO board User Guide Rev 1.2, Mar 2017 Table of Contents 1 Introduction... 2 2 Features... 3 3 Pin Definition... 4 4 Getting Started CC3200 with Energia... 5 4.1 Out of the Box Test... 5

More information

So you think developing an SoC needs to be complex or expensive? Think again

So you think developing an SoC needs to be complex or expensive? Think again So you think developing an SoC needs to be complex or expensive? Think again Phil Burr Senior product marketing manager CPU Group NMI - Silicon to Systems: Easy Access ASIC 23 November 2016 Innovation

More information

Trustzone Security IP for IoT

Trustzone Security IP for IoT Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI CLOUD SECURITY SOLUTIONS AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your

More information

ARM mbed Technical Overview

ARM mbed Technical Overview ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application

More information

Open Source in Automotive Infotainment

Open Source in Automotive Infotainment Open Source in Automotive Infotainment Taeyong Kim (ty.kim@windriver.com) Services & Solutions Wind River Systems 2015 Wind River. All Rights Reserved. Why using Open Source in IoT? Internet of Things

More information

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,

More information

IoT Edge within the IoT Framework

IoT Edge within the IoT Framework IoT Edge within the IoT Framework Axel Dittmann Diplom-Betriebswirt (FH) Diplom-Wirtschaftsinformatiker (FH) Global Technical Solution Specialist IOT CISSP, MCP Twitter: @DittmannAxel Waves of Innovation

More information

EMBEDDED SYSTEMS READY TO USE LECTURE MATERIALS FOR UNDERGRADUATES

EMBEDDED SYSTEMS READY TO USE LECTURE MATERIALS FOR UNDERGRADUATES EMBEDDED SYSTEMS READY TO USE LECTURE MATERIALS FOR UNDERGRADUATES INTRODUCTION 12 WEEK COURSE OUTLINE (1/2) 1.) Introduction What are embedded systems Characteristics Sample Market Segments The IoT Era

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

The Zentri Secure IoT Platform

The Zentri Secure IoT Platform The Zentri Secure IoT Platform Zentri s Secure IoT Platform empowers industrial, commercial, and consumer product companies to securely build, launch, manage, and scale cloud-connected products. With Zentri,

More information

Beyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited

Beyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary

More information

Windows 10 IoT Core Azure Connectivity and Security

Windows 10 IoT Core Azure Connectivity and Security Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a

More information

ARM mbed mbed OS mbed Cloud

ARM mbed mbed OS mbed Cloud ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics

More information

Designing Security & Trust into Connected Devices

Designing Security & Trust into Connected Devices Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases

More information

Beyond TrustZone Part 1 - PSA

Beyond TrustZone Part 1 - PSA Beyond TrustZone Part 1 - PSA Rob Coombs Security Director, Arm Arm Tech Symposia 2017, Hsinchu Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security

More information

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream

More information

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX KillTest Q&A Exam : AZ-300 Title : Microsoft Azure Architect Technologies Version : DEMO 1 / 9 1.Topic 1, Case Study: 1 Label Maker app Requirements Data You identify the following requirements for data

More information

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:

More information

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1

More information

Particle E Series Cloud-integrated hardware platform for cellular IoT devices

Particle E Series Cloud-integrated hardware platform for cellular IoT devices Particle E Series Cloud-integrated hardware platform for cellular IoT devices Particle E Series modules 36.0 x 43.0 x 4.6 mm World s first fully-integrated cellular hardware platform with out-of-box Cloud

More information

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response

More information

Product specification

Product specification MJIOT-AMB-03 Product specification 1 MJIOT-AMB-03module appearance 2 目录 1. Product overview...4 1.1 Characteristic... 5 1.2 main parameters...6 1.2 Interface definition... 7 2. appearance and size... 8

More information

3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse

3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse 3 Software Stacks for IoT Solutions Ian Skerrett Eclipse Foundation @ianskerrett Copyright 2016 The Eclipse Foundation. All Rights Reserved Eclipse Foundation Not-for-profit open source foundation responsible

More information

Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development

Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development New Family of Microcontrollers Combine Scalability and Power Efficiency with Extensive Peripheral Capabilities

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

The challenge with IoT

The challenge with IoT 1 Agenda The challenge with IoT Sensor to Cloud solution Sensor to Cloud system details SimpleLink Sub-1GHz hardware & software solution Getting started 2 The challenge with IoT We are trying to connect

More information

w w w. b a s e t r a i n i n g i n s t i t u t e. c o

w w w. b a s e t r a i n i n g i n s t i t u t e. c o Disclaimer: Some of the images and most of the data in this presentation are collected from various sources in the internet. If you notice any copyright issues or mistakes, please let me know by mailing

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased

More information

UEFI and the Security Development Lifecycle

UEFI and the Security Development Lifecycle presented by UEFI and the Security Development Lifecycle Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Tim Lewis (Insyde Software) Agenda The Threat Is Real The Security Development

More information

Presentation's title

Presentation's title 3 rd April 2017 B03 -In-vehicle technology enabler Presentation's title Dominique Bolignano CEO Prove & Run dominique.bolignano@provenrun.com Introducing myself and Prove & Run Dominique Bolignano, previously

More information

Cypress PSoC 6 Microcontrollers

Cypress PSoC 6 Microcontrollers Cypress PSoC 6 Microcontrollers Purpose-Built for the Internet of Things WWW.CYPRESS.COM/PSOC6 Unmatched Solutions for the Internet of Things EMBEDDED IN TOMORROW The IoT is exploding, with more than 30

More information

Cybersecurity with Automated Certificate and Password Management for Surveillance

Cybersecurity with Automated Certificate and Password Management for Surveillance Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to

More information

HEXIWEAR COMPLETE IOT DEVELOPMENT SOLUTION

HEXIWEAR COMPLETE IOT DEVELOPMENT SOLUTION HEXIWEAR COMPLETE IOT DEVELOPMENT SOLUTION NXP SEMICONDUCTORS PUBLIC THE ONLY SUPPLIER TO PROVIDE COMPLETE IoT SOLUTIONS DSPs, MCUs & CPUs Suite of Sensors NFC, BLE, Thread, zigbee, sub-ghz Wireless Interconnects

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

ARM mbed Reference Designs

ARM mbed Reference Designs ARM mbed Reference Designs Steve Ogborne Senior Engineer Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Contents Intro Smart City Sub-GHz Reference Design Wi-Fi Reference

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity

More information

ARM TrustZone for ARMv8-M for software engineers

ARM TrustZone for ARMv8-M for software engineers ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,

More information

Oberon M2M IoT Platform. JAN 2016

Oberon M2M IoT Platform. JAN 2016 Oberon M2M IoT Platform JAN 2016 www.imgtec.com Contents Iot Segments and Definitions Targeted Use Cases for IoT Oberon targeted use cases IoT Differentiators IoT Power Management IoT Security Integrated

More information

Real-Time Systems and Intel take industrial embedded systems to the next level

Real-Time Systems and Intel take industrial embedded systems to the next level Solution brief Industrial IoT (IIoT) Embedded Software and Systems Real-Time Systems and Intel take industrial embedded systems to the next level Innovative hypervisor and partitioning software increases

More information

Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM

Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Agenda Linaro Linaro s IoT efforts Demo Business Models Design and sell x86 chips 2016 $59.5Bn Revenue Sells

More information

The Software of Things T Y S O N T U T T L E C E O S I L I C O N L A B S A S P E N C O R E C E O S U M M I T S H E N Z H E N 8 N O V E M B E R 2018

The Software of Things T Y S O N T U T T L E C E O S I L I C O N L A B S A S P E N C O R E C E O S U M M I T S H E N Z H E N 8 N O V E M B E R 2018 The Software of Things T Y S O N T U T T L E C E O S I L I C O N L A B S A S P E N C O R E C E O S U M M I T S H E N Z H E N 8 N O V E M B E R 2018 Most technology we ve built so far was for the Internet

More information

TI SimpleLink dual-band CC1350 wireless MCU

TI SimpleLink dual-band CC1350 wireless MCU TI SimpleLink dual-band CC1350 wireless MCU Sub-1 GHz and Bluetooth low energy in a single-chip Presenter Low-Power Connectivity Solutions 1 SimpleLink ultra-low power platform CC2640: Bluetooth low energy

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

Copyright 2017 Samsung. All Rights Reserved. O-Hoon Kwon, Ph.D. Samsung Electronics

Copyright 2017 Samsung. All Rights Reserved. O-Hoon Kwon, Ph.D. Samsung Electronics 1 Copyright 2017 Samsung. All Rights Reserved. O-Hoon Kwon, Ph.D. Samsung Electronics Intro Tizen Linux kernel based Embedded OS for wide range of devices, where Mobile, Wearable, TV are maintained as

More information

NXP MICROCONTROLLER INNOVATION CLOUD CONNECTIVITY WITH AWS & LPC54018

NXP MICROCONTROLLER INNOVATION CLOUD CONNECTIVITY WITH AWS & LPC54018 NXP MICROCONTROLLER INNOVATION CLOUD CONNECTIVITY WITH AWS & LPC54018 JUNE 2018 PUBLIC AGENDA MCU Introduction Cloud Connectivity Applications and challenges we re solving together Introducing Amazon FreeRTOS

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

Developing ASP.NET MVC 4 Web Applications

Developing ASP.NET MVC 4 Web Applications Developing ASP.NET MVC 4 Web Applications Course 20486B; 5 days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

SUSE Linux Entreprise Server for ARM

SUSE Linux Entreprise Server for ARM FUT89013 SUSE Linux Entreprise Server for ARM Trends and Roadmap Jay Kruemcke Product Manager jayk@suse.com @mr_sles ARM Overview ARM is a Reduced Instruction Set (RISC) processor family British company,

More information

Embedded System Project (521423S) - Specifications

Embedded System Project (521423S) - Specifications Embedded System Project (521423S) - Specifications Design phases power consumption, environment etc. partitioning, basic solutions System requirements Sketch of hardware Sketch of software operation procedures

More information

Resilient IoT Security: The end of flat security models

Resilient IoT Security: The end of flat security models Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Zatara Series ARM ASSP High-Performance 32-bit Solution for Secure Transactions

Zatara Series ARM ASSP High-Performance 32-bit Solution for Secure Transactions 1 ARM-BASED ASSP FOR SECURE TRANSACTIONS ZATARA SERIES 32-BIT ARM ASSP PB022106-1008 ZATARA SERIES ADVANTAGE SINGLE-CHIP SOLUTION BEST FEATURE SET IN POS PCIPED PRE-CERTIFIED EMV L1 CERTIFIED TOTAL SOLUTION

More information

Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague

Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims

More information

ARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM

ARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM ARM Trusted Evolution HKG15 February 2015 Andrew Thoelke Systems & Software, ARM 1 ARM Trusted for 64-bit ARMv8-A A refresher Standardized EL3 Runtime For all 64-bit ARMv8-A systems Reducing porting and

More information

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems ISACA Silicon Valley APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems Why Should You Care About APIs? Because cloud and mobile computing are built

More information

Embedded Hardware and Software

Embedded Hardware and Software Embedded Hardware and Software Saved by a Common Language? Nithya A. Ruff, Director, Product Marketing 10/11/2012, Toronto Synopsys 2012 1 Synopsys Industry Leadership $1,800 $1,600 $1,400 $1,200 $1,000

More information

pcduino V3B XC4350 User Manual

pcduino V3B XC4350 User Manual pcduino V3B XC4350 User Manual 1 User Manual Contents Board Overview...2 System Features...3 Single-Board Computer Configuration......3 Pin Assignments...4 Single-Board Computer Setup...6 Required Hardware...6

More information

Device to Cloud. Software Hardware Know How

Device to Cloud. Software Hardware Know How Device to Cloud Software Hardware Know How Who we are q Innovative Australian based company working in Embedded Bluetooth and Wi-Fi for more than 16 years q World leading expertise in embedded Bluetooth

More information

SICS Software Week, October 2014

SICS Software Week, October 2014 to Fog Securing the Edge SICS Software Week, October 2014 Iain Davidson Digital Networking iain.davidson@freescale.com 1 IoT Landscape Multi-market opportunity Wellbeing/Health Transport Energy Industrial

More information

Embedded Linux With Raspberry Pi IOT

Embedded Linux With Raspberry Pi IOT Embedded Linux With Raspberry Pi IOT Module 1 : Raspberry Pi Set up & Configurations Program Raspberry Pi : a credit-card sized computer Python programming for Raspberry Pi Interacting and configuring

More information

Kinetis SDK Release Notes for the TWR-K24F120M Tower System Module

Kinetis SDK Release Notes for the TWR-K24F120M Tower System Module Freescale Semiconductor Document Number: KSDKK24FN256RN Release Notes 1.0.0, 08/2014 Kinetis SDK Release Notes for the TWR-K24F120M Tower System Module 1 Overview These are the release notes for the TWR-K24F120M

More information

F5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016

F5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016 F5 Azure Cloud Try User Guide F5 Networks, Inc. Rev. September 2016 Azureinfo@f5.com Table of Contents Introduction... 3 F5 Web Application Firewall Solution, (WAF) Review... 3 Configuring SSO/Pre-authentication

More information

NFC Framework and NT3H1201 Device Driver v1.1

NFC Framework and NT3H1201 Device Driver v1.1 NFC Framework and NT3H1201 Device Driver v1.1 Quickstart Guide for ARIS board All information contained in these materials, including products and product specifications, represents information on the

More information

New STM32WB Series MCU with Built-in BLE 5 and IEEE

New STM32WB Series MCU with Built-in BLE 5 and IEEE New STM32WB Series MCU with Built-in BLE 5 and IEEE 802.15.4 Make the Choice of STM32WB Series The 7 keys points to make the difference 2 Open 2.4 GHz radio Multi-protocol Dual-core / Full control Ultra-low-power

More information

COURSE 20486B: DEVELOPING ASP.NET MVC 4 WEB APPLICATIONS

COURSE 20486B: DEVELOPING ASP.NET MVC 4 WEB APPLICATIONS ABOUT THIS COURSE In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools and technologies. The focus will be on coding activities that enhance the

More information

Bluetooth Smart Development with Blue Gecko Modules. Mikko Savolainen October 2015

Bluetooth Smart Development with Blue Gecko Modules. Mikko Savolainen October 2015 Bluetooth Smart Development with Blue Gecko Modules Mikko Savolainen October 2015 Agenda Bluetooth & the IoT BGM111 Bluetooth Smart Module Blue Gecko Bluetooth Smart Software Software Development Flow

More information

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology ebook BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

Adafruit Feather nrf52840 Express

Adafruit Feather nrf52840 Express Adafruit Feather nrf52840 Express PRODUCT ID: 4062 The Adafruit Feather nrf52840 Express is the new Feather family member with Bluetooth Low Energy and native USB support featuring the nrf52840! It's our

More information

Developing ASP.NET MVC 5 Web Applications

Developing ASP.NET MVC 5 Web Applications Developing ASP.NET MVC 5 Web Applications Course 20486C; 5 days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework tools

More information

趙庸鎭 (Cho, Yong Jin)

趙庸鎭 (Cho, Yong Jin) Evolution to OS of Everything Tizen Micro profile for low-end IoT devices 趙庸鎭 (Cho, Yong Jin) drajin.cho@samsung.com Software Center, Samsung Elec. Contents Part I. OS of Everything in IoT Part II. Tizen

More information

Hands-On Workshop: ARM mbed : From Rapid Prototyping to Production

Hands-On Workshop: ARM mbed : From Rapid Prototyping to Production Hands-On Workshop: ARM mbed : From Rapid Prototyping to Production FTF-SDS-F0107 Michael Norman, Martin Kojtal A P R. 2 0 1 4 TM External Use Agenda What is mbed? mbed Hardware mbed Software mbed Tools

More information

MYD-JA5D2X Development Board

MYD-JA5D2X Development Board MYD-JA5D2X Development Board MYC-JA5D2X CPU Module as Controller Board 500MHz Atmel SAMA5D26/27 ARM Cortex-A5 Processor 256MB DDR3 SDRAM, 256MB Nand Flash, 4MB Data FLASH, 64KB EEPROM Serial ports, USB,

More information

Developing ASP.NET MVC 4 Web Applications

Developing ASP.NET MVC 4 Web Applications Developing ASP.NET MVC 4 Web Applications Duration: 5 Days Course Code: 20486B About this course In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5

More information

Wireless Connectivity Options for IoT. By: MIST Makers John Varela and Nicholas Landy

Wireless Connectivity Options for IoT. By: MIST Makers John Varela and Nicholas Landy Wireless Connectivity Options for IoT By: MIST Makers John Varela and Nicholas Landy Outline Introduction to the Internet of Things (IoT) Wireless Communication in IoT Current Standards IEEE 802.11 (Wi-

More information

A Developer's Guide to Security on Cortex-M based MCUs

A Developer's Guide to Security on Cortex-M based MCUs A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone

More information

WHY APPLICATIONS ARE STILL DRAINING OUR BATTERIES and how we can help. Aaron Schulman & Sachin Katti

WHY APPLICATIONS ARE STILL DRAINING OUR BATTERIES and how we can help. Aaron Schulman & Sachin Katti WHY APPLICATIONS ARE STILL DRAINING OUR BATTERIES and how we can help. Aaron Schulman & Sachin Katti We cannot rely on improvements in battery technology In past 30 years: only 4x improvement in energy

More information